Analysis
-
max time kernel
114s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Resource
win10v2004-20250217-en
General
-
Target
f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
-
Size
192KB
-
MD5
59440276b249b38e5ad536f4a3ca922e
-
SHA1
db67605a431ee34e7c9f901c90eaa57b4505b7ba
-
SHA256
e62543f0558ee275d799b6f9d9369b442a300814b7c147eac65d639476910eb3
-
SHA512
a3bd20139e61a6dbcde863bf39f69bb3b19293174ea63e5eb2edeb3f1e317629f85fe1fe1d2088b50b6ef6294806e3ec886c5b6d952ba985f107fdfbf364435a
-
SSDEEP
3072:q75DzyLgv8vT6nRc24odbkDXFwzIc3jiptvwF:mDjv8v44o+X3pWF
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\read_me.txt
deathransom
Signatures
-
DeathRansom
Ransomware family first seen at the start of 2020. Initial versions did not actually encrypt files.
-
Deathransom family
-
Renames multiple (159) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 25 IoCs
description ioc Process File opened for modification C:\Users\Admin\3D Objects\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Videos\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Documents\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Libraries\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Links\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Searches\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Desktop\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Music\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Documents\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Videos\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Music\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Downloads\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe File opened for modification C:\Users\Public\Pictures\desktop.ini f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 548 3972 WerFault.exe 85 2140 3972 WerFault.exe 85 1980 3972 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe"C:\Users\Admin\AppData\Local\Temp\f78a743813ab1d4eee378990f3472628ed61532e899503cc9371423307de3d8b.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 6762⤵
- Program crash
PID:548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 6762⤵
- Program crash
PID:2140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 10482⤵
- Program crash
PID:1980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3972 -ip 39721⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3972 -ip 39721⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3972 -ip 39721⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5279c40e3f4cc380a9bc4228579a5f52d
SHA1f64b24c7f2b75ed9c53c4df9ad09620c86d3389f
SHA25643ef8c12340bbace5463b8c809346f27a5d7d1c28d786d17c62924eebade1a05
SHA5127dd74fb85c2f18abc39f696b3e5cc81571ba6afe362d04e5da6010555db092288cbc77b1a75ce0f7f037af4f6a33bf2c61ef6d8a5bb3df4baec60e33a3cbda91